Confidentiality of Information on Dedicated Leased Lines

Global Information Assurance Certification Paper
Copyright SANS Institute
Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Key fingerprint = AF19of
FA27
2F94 998D FDB5
DE3D
F8B5 06E4 A169
4E46 Lines
Confidentiality
Information
on
Dedicated
Leased
William M. Karwisch Jr.
May 1, 2003
GSEC Practical Assignment
Version 1.4b
fu
ll r
igh
ts.
Abstract
eta
ins
Security decisions are based on a number of foundational assumptions. The
effectiveness of any decision depends on the soundness of the underlying assumptions.
To ensure that security is adequate and will work, these assumptions need to be
examined. Any time we hear that “A” is secure (or insecure) because of “B”, we need to
ask some questions. Why that is true? How do we know? What do we know about “B”
that makes “A” secure or not? This questioning must be done without bias and without
assuming that the conclusion is known in advance.
ho
rr
One assumption frequently heard is that a wide area network (WAN) is secure because
its sites are linked using dedicated leased lines. Many people believe that these lines
are inherently secure. Some providers of these lines certainly advertise them as secure.
tu
te
20
03
,A
ut
It is unsound to assume without question that dedicated leased lines are secure. This
paper examines the properties of leased lines and the reality about their security. The
main focus is the risk of loss of secrecy of information transmitted on dedicated leased
lines. (The discussion of other aspects of security of dedicated leased lines, such as the
analysis and risk-mitigation related to loss of service, will be left to others.) This paper
reviews the evolution of dedicated leased lines and discusses how this influences their
security. It examines the decisions made by telephone companies in response to
competitive pressures and how these decisions may impact security.
©
SA
NS
In
sti
The examples here are commonly used point-to-point services with DS1 and DS3 lines
(T1 and T3). Not discussed is the security of the end-points, which is essentially the
same irrespective of the line type. A full discussion of all types of dedicated leased lines
(which include optical, microwave, satellite, radio and other transmission media) is
beyond the scope of this paper; although many of the concepts discussed here apply to
them. The discussion of dedicated leased lines that connect with ISPs and frame-relay
services will also be limited, but many of the concepts apply to them as well.
The Myth of Inherent Security
Frequently there is a need to transmit information securely from one location to another.
More specifically, there is a requirement that information be communicated dependably
when needed, while protecting it from disclosure to unauthorized parties. The key
attributes of the communications link are availability, reliability and confidentiality.
A popular choice for meeting these requirements is a point-to-point dedicated leased
line. The reliability and availability of leased lines is as good as the industry has to offer.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
fingerprint
= AF19
2F94
998D FDB5
DE3D
F8B5 06E4ofA169
4E46 is
It isKey
available
because
it isFA27
always
connected
and
the bandwidth
the circuit
dedicated. It is reliable because the circuit uses fixed routing (although this is not always
strictly true, as will be discussed later) and the service can be managed from end-toend.
ins
fu
ll r
igh
ts.
Dedicated leased lines are sometimes used with the assumption that the
communications they carry will remain confidential. The reasoning is that they must be
secure because attackers cannot connect to them over the Internet, vendors market
them as secure, and many people refer to them as private lines. The lack of ubiquitous
access to private lines from the Internet provides significant security; however, one
should never accept marketing claims without checking the facts. Private, in this case,
means only that the telephone company reserves the line for the customer’s exclusive
use. Some telephone companies, such as BellSouth (“BellSouth® Long Distance”),
clearly market private lines as providing guaranteed capacity with managed service,
without making claims about security.
,A
ut
ho
rr
eta
Other vendors market private lines, without qualification, as secure. MCI (“Metro Private
Line”) is one example: “MCI, an inter-exchange carrier, now offers local service over its
own local network facilities. MPL has the bandwidth capacity to provide your company
with a flexible, secure, and cost-effective intraLATA (Local Area Transport Area) private
line solution.” Telenor Business Solutions (“Internet Services”) is explicit: “How secure is
the Leased Line service? A Leased Line is inherently secure in it’s own right because it
operates as a point-to-point service.”
In
sti
tu
te
20
03
Once the decision is made to use a leased line, it is frequently assumed that there is no
need to take additional measures to preserve confidentiality of data transmissions.
Although confidentiality is easily accomplished on leased lines, the vendor does not
typically guarantee it. In fact, AT&T (“AT&T Business”), MCI (“General Terms”) and
Sprint (“Schedule No. 7”), among others, specifically absolve themselves, by the terms
and conditions of their service agreements, of any liability resulting from loss of
confidentiality or unauthorized access.
©
SA
NS
The overall security of a system results from the security (or lack of security) of each of
its components. The security of a network that uses a dedicated leased line depends on
the security of the line. To evaluate the security of the line, one must look beyond
marketing claims. Too often, the security of a line is uncritically accepted without
examining the security of its components. This failure helps to perpetuate the myth that
they are inherently secure. Although leased lines are not frequently compromised,
compromises that do occur are seldom publicized, which does little to dispel the myth.
The Reality of Leased Lines
Leased lines have limitations and vulnerabilities that should be considered and
mitigated when using them as components of networks. These lines are vulnerable to
two main categories of incidents: denial of service and loss of secrecy.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Keyof
fingerprint
= AF19
2F94
998D FDB5
DE3D F8B5
06E4 A169
4E46
Denial
service may
be aFA27
result
of accident
or attack.
Construction
work
occasionally
damages these lines. An attacker may intentionally cut them. If an update to a master
database of an inventory system were delayed by loss of service, there may be little or
no damage. But if an emergency response system did not work, the result could be
catastrophic. Regardless of the impact, an outage would be obvious. The risk of loss of
service is either accepted or mitigated by providing redundant circuits and routes.
ins
fu
ll r
igh
ts.
Denial of service is an obvious problem, but loss of secrecy of information is a subtle
problem. Like denial of service, the damage done by loss of secrecy depends on the
application. Unlike the loss of service, however, compromised secrecy may not be
detected at all. If someone captures your information without getting caught, without
disrupting your service, and without telling you, how would you know it happened? Even
if detected, the appropriate action may not be obvious. Sometimes, nothing would be
sufficient to mitigate the damages. Once a secret is revealed, it cannot be made secret
again.
,A
ut
ho
rr
eta
Dedicated leased lines provide a degree of security because ubiquitous access is not
available. Random attacks are not likely to occur. Virtually all attacks on these lines are
specifically targeted. Physical access is risky; wiretapping and eavesdropping are
difficult and illegal. While this will keep out casual attackers, one should still be
concerned about the possibility of a skilled and motivated attacker who may target a
specific leased line for a specific reason.
sti
tu
te
20
03
Linder (2001) correctly points out that “private leased-line facilities are vulnerable to
some of the same security threats as the IP-based bearer networks. However, the lack
of ubiquitous access to private line implementations makes protection of these networks
easier to implement and sustain.” His paper continues to discuss “securing networks
from the Internet and other un-trusted IP-based bearer networks.” This implies that
private leased lines may be part of a trusted network. How far this trust extends will be
discussed later in this paper.
©
SA
NS
In
The risks are not new – information has been available for many years. It was publicly
discussed in depth on the Internet as early as 1995. (This information was not new then;
leased lines are much older than the Internet. The point is that the Internet made this
information widely and publicly available years ago.) Maillet (1995) triggered an
interesting discussion thread when he wrote, “If we use didicated [sic] leased lines from
the US to Europe (say from AT&T or MCI), can someone in between get our data?
What about if [we] used a “cloud” style network like ATM or Frame Relay which use
PVCs instead of a dedicated curcuits [sic]?” Responses show that several individuals
were very aware of the implications and include discussions of the risk, modes of attack
and anecdotal evidence of interceptions that had already occurred.
For applications that have a critical dependency on maintaining the confidentiality of
information, trusting leased lines may not be appropriate. Assuming that a calculable
loss could result from a compromise, the value of the risk is calculated to be the cost of
the loss multiplied by the probability that a compromise will occur. In the case of loss of
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
AF19
FA27 2F94
998Dthe
FDB5
F8B5
06E4 A169
secrecy,
however,=the
estimates
for both
lossDE3D
and the
probability
of 4E46
occurrence are
difficult to quantify. Attempts to fix the value of the risk tend to be imprecise because the
loss value can be extremely large, while the probability of occurrence value can be
extremely small. Still, if the cost of mitigating the risk were judged to be low in
comparison to the potential for damage, mitigation would be prudent. In any case, if the
cost of mitigation is less that the value assigned to the risk, mitigating the risk is the
correct approach.
ins
fu
ll r
igh
ts.
The discussion of quantifying the cost associated with compromised confidentiality is
outside the scope of this paper. It is obvious, however, that the cost would be
unacceptable in many cases. One case would be where national security was
compromised. Another case would be where a company’s competitive advantage was
lost because its proprietary information had been made public. Another case would be
where a financial institution inadvertently disclosed sensitive customer data and
transactions to unauthorized individuals.
,A
ut
ho
Assessing risk of exploiting underlying technologies
Assessing risk attributable to extended trust relationships
Assessing the motivation for targeting a particular leased line
Obtaining reliable historical statistics for actual compromises
Establishing the number of actual compromises that go undetected
03
o
o
o
o
o
rr
eta
The difficulty in quantifying the probability that a compromise will occur results from the
difficulty of quantifying the underlying components of risk, including:
sti
tu
te
20
One should compare the cost of mitigating the risk with the value calculated for the risk
to determine whether mitigation is the correct approach, but evaluating the risk may be
prohibitively difficult and expensive. One may decide that the potential for loss is great
enough and the cost of mitigating the risk is low enough to justify mitigation without a
formal evaluation.
©
SA
NS
In
The need for VPNs on public switched networks (PSNs) is clear and is evidenced by the
wealth of research and articles on the subject and the number of VPN products
available. They provide confidentiality, prevent easy unauthorized access at end points,
and prevent man-in-middle attacks. Data that is intercepted in transit is useless to an
attacker. These traits are just as desirable for private, leased facilities as they are for
public networks. Proper risk evaluation must be performed in both cases. The
conclusion that mitigation of risk is not necessary for either public or private networks
should be the result of careful analysis.
Point-to-Point Communications and the Telecommunications
Network
The need to provide cost effective service has driven the development of
telecommunications technology. Pressure to be cost effective has been sometimes the
result of regulatory action and sometimes the result of competition, but has remained a
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
= AF19
FA27 2F94 998D
FDB5
DE3DTo
F8B5
A169 4E46
constant
throughout
the development
of the
industry.
fully06E4
understand
today's
telecommunications technology and how it applies to point-to-point, dedicated leased
lines, it is useful to understand how it evolved.
fu
ll r
igh
ts.
By the time the need for wide-area data communications emerged, the telephone
network had already matured. Adapting the existing technology to meet these emerging
needs was natural and cost effective. Existing technologies were adapted to meet the
emerging needs of data communications. Telecommunications companies used (and
still use) multiplexing, sharing of facilities, and other techniques to maximize utilization
of their resources and deliver service at the lowest possible cost.
eta
ins
Probably the simplest example of point-to-point communication is two people talking
directly with each other (without a telephone). Of course, eavesdropping is always a
possibility; so, if secrecy is required, they can find a private location for their
conversation. As the distance between them increases, the difficulty of having a private,
real-time conversation increases. The telephone was invented to solve the problem.
,A
ut
ho
rr
Alexander Graham Bell's famous first telephone used a true, dedicated, point-to-point,
and private telecommunications line. (Although not leased, it was indeed owned by what
was to become the “telephone company.”) The two sets were connected to the
endpoints of the line, which had no other connections and was dedicated for their
exclusive use.
sti
tu
te
20
03
As the number of people who used telephones increased, it became obvious that a
separate point-to-point connection between each distinct pair of people that wanted to
talk would not be feasible. The central office was born. All telephone lines went from the
home or business to the central office. At first, the lines were directly connected to
switchboards. When someone wanted to make a call, an operator physically connected
the line from the calling party to the line connecting the called party using a patch cord,
thus establishing a circuit between the two phones.
SA
NS
In
An important privacy problem emerged – the operator had a headset and could
eavesdrop on the conversation. The eavesdropping operator became a cliché, which is
frequently parodied, as in Lily Tomlin’s portrayal of the operator, “Ernestine.”
©
Later, phones had rotary dials and the primary duty of connecting calls was assigned to
electro-mechanical switches that counted the pulses from the rotary dials. Eventually,
the pulse-counting systems gave way to tone systems that use computer switching –
the systems that we use today.
All the lines were collected and switched at the telephone company's central office. (The
central office, with its switches, is analogous to the Ethernet switches and routers that
we use to connect our computer networks.) If a call could be connected locally, the
switch did so. Of course, each central office needed to handle calls for lines to which it
was not connected. Lines were installed between central offices for this. If the call could
not be connected locally, the switch made a routing decision and the circuit was
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
= AF19
FA27 2F94
998D FDB5
F8B5
06E4 A169of
4E46
connected
to a switch
at another
location,
which DE3D
had the
responsibility
completing the
call.
fu
ll r
igh
ts.
The number of calls that could be simultaneously connected between any two offices
depended on the number of lines that were available. When a line became free, it was
available for another call. Sharing capacity in this way maximized the efficiency of calls,
but it created the situation that when all the lines were busy, a call could not be
connected. To meet increasing demands, the companies installed more lines. Just a
few decades ago, it was not unusual to see cross-country installations that contained
dozens of individual wires spaced evenly in large arrays from pole to pole.
ins
In 1927, Harry Nyquist of Bell Labs determined how to convert analog signals to digital.
Nyquist determined that 64,000 bps were required to adequately convert a voice
conversation to digital. This work led to the development of the DS0 signal, which is “the
basic building block of modern communications.” (“How do we convert”)
ho
rr
eta
In 1962, Bell Labs developed the T1 carrier, which could multiplex 24 DS0 signals
together into the DS1 signal that the T1 carrier transmitted. The standard DS1 lines that
we still use today are the implementation of T1 on twisted-pair copper wires. Similarly,
28 DS1 signals can be multiplexed together into a DS3 signal, usually referred to as T3.
tu
te
20
03
,A
ut
The conversion of analog to digital and the multiplexing of circuits allowed increased call
density on the telecommunications companies’ facilities. Bell Labs (“T1 Carrier”) says,
“One of the interesting features of T1 was that the 1.544 Mb/s signal was being
transmitted on the same 24-gauge twisted-pair copper wire that was used as subscriber
lines to connect customers' telephones to the central office switch. The use of this 24gauge wire made it possible for telephone companies to greatly expand their networks
in urban areas, where many cable lines were run in underground conduit that had
reached their capacity.”
©
SA
NS
In
sti
DS1 and DS3 lines require repeaters at regular intervals to prevent loss of signal due to
attenuation on copper lines. The economics of transmitting over long distances favored
microwave and satellite as the transmission media. Eventually, fiber-optic cable
replaced copper and microwave as the medium of choice for transmission over long
distances because it allows even higher transmission density and can transmit over
great distances very economically. However, T1 and T3 remain popular choices for endpoint service connections, such as an end-user’s PBX or WAN connection.
Remote Data Communications using Leased Lines
The development of the telecommunications network predated the development of
computers. When computers were ready to communicate with each other, telephone
companies found themselves in the enviable position of being able to use their existing
infrastructure to provide data communication services to their customers. The
technology that was developed to multiplex many voice calls together on a single line
was ideal for transmitting large amounts of data over long distances.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
= AF19 FA27 2F94
998D FDB5
A169
4E46
Automated
data communications
occurred
muchDE3D
earlierF8B5
than06E4
the first
computers.
According to Nelson (1963), Frank Pearne had begun work on the first Teletype
machine as early as 1902. The Teletype business developed steadily over the next
several decades before computers arrived on the scene.
fu
ll r
igh
ts.
In the 1950’s, communication between computers was slow and customized. Modems
were developed to communicate using the Public Switched Telephone Network (PSTN).
There was no consistent, universal approach to interconnect computers. The ARPANET
project in 1969, which eventually resulted in the Internet, allowed computers to connect
according to defined standards. Digital signaling was already in place at the telephone
company and was ideal for internetworking computers.
rr
eta
ins
Today, because of the wide availability of telecommunications infrastructure, one rarely
has the need to install and operate one’s own WAN infrastructure. Telephone
companies provide dedicated leased lines to connect WANs. “Leased” means that the
line is owned by the telecommunications company and is used by the customer for a
fee. This is a contractual arrangement for the use of the line and has no bearing on
security. “Dedicated” means that the line is reserved for the exclusive use of the
customer. Two questions need answers: what is dedicated and for what period of time?
20
03
,A
ut
ho
A line is dedicated when it is reserved for a specific use. In a limited sense, the circuit
used for an ordinary voice call is dedicated. Once the circuit is established, the
connection and the bandwidth is allocated and reserved for the exclusive use of the
caller for the duration of the call. To request such a connection, a caller needs only to
pick up a handset and dial a number. Of course, there is no guarantee that the facilities
will be available at the time the call is placed – the caller could get a busy signal.
©
SA
NS
In
sti
tu
te
To request a dedicated leased line, one must call the telephone company’s sales
representative and place an order. Again, there is no guarantee that the facilities will be
available at the time the request is made. However, once connected, contracts for
dedicated lines specify that the line will be reserved for the exclusive use of the
customer for the duration of the contract. So one important distinction between
dedicated and non-dedicated lines is the length of time during which the line is
reserved. However, the duration of the connection has little relevance with respect to
security. In fact, one might argue that everything else being equal, a longer-term
connection may be more vulnerable than a shorter-term connection because an
attacker would have more opportunity to research and revisit the target.
Some specialized installations use facilities installed by the telephone company that are
routed directly from one location to another. These are rare because they generally
cannot use the telephone company’s existing facilities – new wiring must be installed for
the entire length of the circuit. Also, such circuits cannot be monitored or managed by
the vendor because of the lack of connections to the wiring.
Most point-to-point, dedicated leased lines use local loops that connect the end points
to the vendor’s central office where the connection is made. If the end points connect to
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
= AF19arrangements
FA27 2F94 998D
06E4
4E46the circuit
different
central offices,
are FDB5
madeDE3D
by theF8B5
vendor
to A169
complete
between the central offices.
fu
ll r
igh
ts.
Provisioning, in telephone company terminology, is the process of connecting the end
points of a line through the various pieces of interposed equipment that complete the
circuit. It is possible to provision a point-to-point line using direct connections. Even
when the line passes through a central office, the line can be manually connected,
bypassing other equipment.
ins
Manually connected lines reduce the risk of being compromised because they are
connected to fewer pieces of interposed equipment. However the goal of security in this
case competes with the goal of offering cost-effective, manageable service. A manually
connected line cannot be easily monitored or managed. In addition, manual connections
are labor-intensive and expensive.
20
03
,A
ut
ho
rr
eta
To make the lines manageable and cost effective, telephone companies usually
provision local loops using specialized switches called digital cross-connect switches
(DCSs). According to Sunrise Telecom (“Working with T3”), “DCSs commonly reduce
the space required for achieving channel cross-connection, eliminate the manual labor
associated with cross connection, and can provide amazingly fast computerized
rerouting of facilities in the event of a network outage.” Marconi Communications
(“MD202”) increases the cost efficiency by centralizing the management of switches: “A
centrally managed, electronic distribution frame means that new users can be
provisioned (or existing users reconfigured) remotely and quickly. This reduces
manpower costs and also the operational risks associated with manual tasks in
equipment rooms.”
SA
NS
In
sti
tu
te
DCSs can switch DS1s and DS3s individually or multiplex them onto higher-bandwidth
lines such as DS3s and optical lines. Multiplexing lower-capacity lines together onto
higher-capacity lines results in lower costs. If the two endpoints of a dedicated leased
line do not connect to the same central office, it is likely that the circuit will be
multiplexed together with other circuits for some portion of its route. Because dynamic
load balancing and dynamic routing also lead to lower costs, depending on the
contractual agreement with the telephone company, the configuration and routing of the
dedicated line may change sometimes in a manner that is transparent to the end user.
©
The differences in the security between dedicated leased lines and the PSTN are a
result of how they are connected and who has access to them. Imaging this illconceived scenario (this is stupid – do not do it!): your PC at your office is connected to
a dial-up modem that is configured to answer incoming calls. You have pcAnywhere
running on your PC with no password. Your PC is connected to your network, to which
you are connected as Administrator. This is a security nightmare by any measure.
Nevertheless, if you keep your computer at home connected to this modem at all times,
no one can dial in and take over your network because no one can make a connection.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Keyabove
fingerprint
= AF19
FA27
2F94line
998D
FDB5
DE3Dare
F8B5
06E4 A169
In the
scenario,
if the
dial-up
and
modems
replaced
with 4E46
a dedicated
leased line, the only fundamental difference is in what happens if the connection is
broken. Using modems, if the connection is broken, someone else can dial in. Using a
leased line, if the connection is broken, no one else can connect.
fu
ll r
igh
ts.
(The Internet presents a totally different issue with respect to connections. In general,
using an Internet connection does not preclude others from using it simultaneously. No
one will get a busy signal if he connects to your server via the Internet. Your Internet
connection is available to anyone, from anywhere. Firewalls and other security
measures must be used to control access.)
ins
The lack of ubiquitous access to the end-points of a dedicated leased line is, in fact, the
main feature that contributes to its security. Like many other aspects of network
security, reducing exposure or opportunity improves the security of dedicated leased
lines. An attacker who cannot connect cannot do any damage.
rr
eta
Unfortunately, the lack of ubiquitous access may not translate to the absolute lack of
access. Physical access is one possibility. Another possibility is that some piece of
equipment that is interposed in the circuit may be vulnerable.
20
03
,A
ut
ho
Physical access may be possible at the end-user’s wiring closet, at the telephone
company’s central office, and at any point in between – such as junction boxes and
vaults. Physical access may be obtained surreptitiously or through the actions of an
employee of the end-user or the telephone company. Once a tap is made, the attacker
need only decode the signal into a usable data stream. While not trivial, there are no
insurmountable obstacles in doing so.
©
SA
NS
In
sti
tu
te
Today’s DCSs are usually managed remotely and have extensive capability for
reconfiguration, testing and monitoring. Products are available that combine the
functionality of PSTN switches and DCSs. If we are to treat dedicated leased lines as
part of our trusted network, clearly we must also extend that trust to the vendor’s
equipment. The vendor’s ability to manage leased-line infrastructure remotely using its
IP network requires its customers to extend trust even further to its networks,
employees, sub-contractors, and vendors. Can the telephone company’s network be
hacked? If so, can its switches be hacked? If so, do the switches provide the capability
to capture your traffic? If you are satisfied with the answers to these questions today,
what about next year?
Conclusions
Dedicated leased lines can be useful elements of a WAN and can contribute to the
overall security of a network if their individual characteristics are understood and
accounted for in consideration of overall security design. They are suitable for many
applications, but they are not all the same; some are more dedicated than others.
Because they share many characteristics with other types of service, they also may
share lines and equipment with other types of service.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
fingerprint
= AF19 FA27
2F94 998D
F8B5
06E4
A169
4E46to it.
YouKey
know
your information
is secure
if youFDB5
knowDE3D
that only
you
have
access
Otherwise, you trust equipment, procedures, and people to maintain security for you.
Ultimately, the degree to which you find the level of security to be acceptable depends
on how important your information is and how well you have verified the trustworthiness
of things not directly in your control. The chain of trust may include your employees,
your vendors, your vendors’ employees, your subcontractors, and your vendors’
subcontractors.
fu
ll r
igh
ts.
Somewhere, someone, who is more interested in surfing the Internet than doing his job,
might not change the default password for remotely accessing the new DCS.
ins
Somewhere, someone, who does not have the proper training because of recent
downsizing, might incorrectly reconfigure a circuit while attempting to do some routine
maintenance.
rr
eta
Somewhere, someone, who has a huge gambling debt, might be willing to let your
competitor eavesdrop on your circuit in exchange for making his problem go away
before his wife finds out.
tu
Five points have been made:
te
20
03
,A
ut
ho
Effectively verifying the security of dedicated leased lines, to any degree of certainty,
would be difficult and expensive. Most network professionals do not have the resources
or the inclination to fully evaluate the security of their vendors. They would be wise,
however, to look beyond the vendors’ marketing claims and be aware of unseen issues
that affect security. The safest choice is to not trust leased lines with protecting
confidentiality of sensitive information. Encryption would provide a relatively simple, and
inexpensive solution to effectively protecting confidentiality while taking advantage of
the reliability and availability provided by dedicated leased lines.
©
SA
NS
In
sti
o The concepts of “leased” and “dedicated,” regarding WAN links, are contractually
defined
o The facilities that connect the end-point locations of dedicated leased lines are
not substantially different from those used in the PSTN
o The telephone company does not provide any guarantees with respect to
security of the service unless the contract states that it does (the contract often
states that it does not)
o The lack of ubiquitous access from the Internet contributes to security, but is not
sufficient to guarantee security
o Securing the data may be more feasible than securing the line
Summary
In the effort to drive costs lower, the distinction between dedicated leased lines and
other lines is increasingly becoming one of service-level guarantees. Dedicated leased
lines are often justified solely because of their availability, reliability and capacity.
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint
= AF19 FA27private,
2F94 998D
FDB5
DE3D F8B5
06E4isA169
4E46
Viewing
them as stand-alone,
secure
facilities,
however,
naïve.
They share
many characteristics, and often facilities, with the PSTN infrastructure. Although difficult
to compromise, in many ways they are not different from public switched facilities.
fu
ll r
igh
ts.
If these lines are to be used as part of a trusted network, the notion that they are
inherently secure should be abandoned. Instead, a careful security evaluation should be
undertaken, considering the specific configuration, connection points, equipment used,
and the extent of access to the components of the line. The value of maintaining the
confidentiality of the information to be transmitted should also be considered. The cost
of a sufficient evaluation may be such that the less-expensive alternative is to not treat
leased lines as part of the trusted network. In this case, confidentiality may be protected
by using the same techniques that are used to secure information transmitted over
public networks.
rr
eta
ins
The decision of whether or not to trust dedicated leased lines with protecting the
confidentiality of information must be based on knowledge of the details – not on myths
or marketing claims.
ut
ho
References
03
,A
“AT&T Business Communications Services Agreement”, AT&T Business, URL:
http://www.business.att.com/agreement/serviceagreement.jsp (25 April 2003)
tu
te
20
“BellSouth® Long Distance Private Line Service”, BellSouth Long Distance, Inc., 2002,
URL: http://www.bellsouth.com/bsldcc/at_your_business/pdfs/privateLines.pdf (25 April
2003)
In
sti
“Metro Private Line Services”, MCI, URL:
http://global.mci.com/us/enterprise/data/privatelines/metro/ (25 April 2003)
SA
NS
“Internet Services”, Telenor Business Solutions, URL:
www.telenorbusinessolutions.co.uk/services/internet_services/faqs/Leased%20Lines.ht
ml (25 April 2003)
©
“GENERAL TERMS AND CONDITIONS OF SERVICE”, MCI, 2003, URL:
http://global.mci.com/publications/service_guide/products/docs/g_general_terms_and_c
onditions.doc (25 April 2003)
“How Do We Convert an Analog Signal to a Digital Signal?”, Lucent Technologies,
2002, URL: http://www.bell-labs.com/save/technology/common/64000bits.html (25 April
2002)
Lindner, Craig E., “Information Security Primer”, 2001, URL:
http://www.sans.org/rr/securitybasics/infosec_primer.php (25 April 2003)
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Maillet, Edward ([email protected]) “How secure is a WAN then?” [Email], 29 September 1995, URL: http://www.netssys.com/firewalls/firewalls9509/0949.html (25 April 2003)
fu
ll r
igh
ts.
“MD202 Cross-Connect – for flexible, future-proof and profitable private and leased-line
circuits”, Marconi Communications, 2000, URL:
http://www.marconi.com/media/MD202_Bro.pdf (26 April 2003)
Nelson, R. A., “History Of Teletype Development”, Teletype Corporation, 1963, URL:
http://www.thocp.net/hardware/history_of_teletype_development_.htm (25 April 2003)
ins
“SCHEDULE NO. 7”, Sprint, 2002, URL:
http://www.sprintbiz.com/customer_center/product_support/schedules/downloads/7tand
c.pdf (25 April 2003)
rr
eta
“T1 Carrier -- The First Digital Transmission”, Lucent Technologies, 2002, URL:
http://www.bell-labs.com/save/technology/common/t1carrier.html (25 April 2003)
©
SA
NS
In
sti
tu
te
20
03
,A
ut
ho
“Working with T3 and T1: Technology, Troubleshooting and Fault Location”, Sunrise
Telecom, Inc., URL: http://www.sunrisetelecom.com/technotes/T1-T3_book.pdf (26 April
2003)
© SANS Institute 2003,
As part of GIAC practical repository.
Author retains full rights.
Last Updated: June 17th, 2017
Upcoming Training
SANS Minneapolis 2017
Minneapolis, MN
Jun 19, 2017 - Jun 24, 2017
Live Event
SANS Columbia, MD 2017
Columbia, MD
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS Paris 2017
Paris, France
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS Cyber Defence Canberra 2017
Canberra, Australia
Jun 26, 2017 - Jul 08, 2017
Live Event
SANS London July 2017
Jul 03, 2017 - Jul 08, 2017
Live Event
Cyber Defence Japan 2017
London, United
Kingdom
Tokyo, Japan
Jul 05, 2017 - Jul 15, 2017
Live Event
SANS Munich Summer 2017
Munich, Germany
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Cyber Defence Singapore 2017
Singapore, Singapore
Jul 10, 2017 - Jul 15, 2017
Live Event
Community SANS Phoenix SEC401
Phoenix, AZ
Jul 10, 2017 - Jul 15, 2017
Community SANS
SANS Los Angeles - Long Beach 2017
Long Beach, CA
Jul 10, 2017 - Jul 15, 2017
Live Event
Mentor Session - SEC401
Ventura, CA
Jul 12, 2017 - Sep 13, 2017
Mentor
Mentor Session - SEC401
Macon, GA
Jul 12, 2017 - Aug 23, 2017
Mentor
Community SANS Atlanta SEC401
Atlanta, GA
Jul 17, 2017 - Jul 22, 2017
Community SANS
SANSFIRE 2017
Washington, DC
Jul 22, 2017 - Jul 29, 2017
Live Event
SANSFIRE 2017 - SEC401: Security Essentials Bootcamp Style
Washington, DC
Jul 24, 2017 - Jul 29, 2017
vLive
Community SANS Charleston SEC401
Charleston, SC
Jul 24, 2017 - Jul 29, 2017
Community SANS
Community SANS Fort Lauderdale SEC401
Fort Lauderdale, FL
Jul 31, 2017 - Aug 05, 2017
Community SANS
SANS San Antonio 2017
San Antonio, TX
Aug 06, 2017 - Aug 11, 2017
Live Event
SANS Boston 2017
Boston, MA
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Prague 2017
Prague, Czech Republic
Aug 07, 2017 - Aug 12, 2017
Live Event
Community SANS Omaha SEC401*
Omaha, NE
Aug 14, 2017 - Aug 19, 2017 Community SANS
SANS New York City 2017
New York City, NY
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Salt Lake City 2017
Salt Lake City, UT
Aug 14, 2017 - Aug 19, 2017
Live Event
Community SANS San Diego SEC401
San Diego, CA
Aug 21, 2017 - Aug 26, 2017 Community SANS
Virginia Beach 2017 - SEC401: Security Essentials Bootcamp
Style
Community SANS Trenton SEC401
Virginia Beach, VA
Aug 21, 2017 - Aug 26, 2017
Trenton, NJ
Aug 21, 2017 - Aug 26, 2017 Community SANS
SANS Virginia Beach 2017
Virginia Beach, VA
Aug 21, 2017 - Sep 01, 2017
Live Event
SANS Adelaide 2017
Adelaide, Australia
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Chicago 2017
Chicago, IL
Aug 21, 2017 - Aug 26, 2017
Live Event
Mentor Session - SEC401
Minneapolis, MN
Aug 29, 2017 - Oct 10, 2017
Mentor
SANS San Francisco Fall 2017
San Francisco, CA
Sep 05, 2017 - Sep 10, 2017
Live Event
vLive